Defensive tactics used against viruses, infiltration attempts and other software threats. Instead of using cutting edge systems, which are so complex that they may contain numerous unknown security holes, only the simplest possible systems are used (which can presumably be checked). Compare to the practice of employing baselines to deal with certain forms of blights, since their slow low-bandwidth consciousness is impervious to many kinds of manipulation that would threaten higher order beings.